Osmedeus - A Workflow Engine For Offensive Security


A Workflow Engine For Offensive Security


Installation

NOTE that you need some essential tools like curl, wget, git, zip and login as root to start

bash -c "$(curl -fsSL https://raw.githubusercontent.com/osmedeus/osmedeus-base/master/install.sh)"

Build the engine from source

Make sure you installed golang >= v1.17

mkdir -p $GOPATH/src/github.com/j3ssiegit clone --depth=1 https://github.com/j3ssie/osmedeus $GOPATH/src/github.com/j3ssie/osmedeuscd $GOPATH/src/github.com/j3ssie/osmedeusmake build

Usage

osmedeus scan -f [flowName] -t [target] osmedeus scan -m [modulePath] -T [targetsFile] osmedeus scan -f /path/to/flow.yaml -t [target] osmedeus scan -m /path/to/module.yaml -t [target] --params 'port=9200' osmedeus scan -m /path/to/module.yaml -t [target] -l /tmp/log.log cat targets | osmedeus scan -f sample # Practical Scan Usage: osmedeus scan -T list_of_targets.txt -W custom_workspaces osmedeus scan -t target.com -w workspace_name --debug osmedeus scan -f general -t www.sample.com osmedeus scan -f gdirb -T list_of_target.txt osmedeus scan -m ~/.osmedeus/core/workflow/test/dirbscan.yaml -t list_of_urls.txt osmedeus scan --wfFolder ~/custom-workflow/ -f your-custom-workflow -t list_of_urls.txt # Provider Usage: osmedeus provider build osmedeus provider build --token xxx --rebuild --ic osmedeus provider create --name 'sample' osmedeus provider health --debug # Cloud Usage: osmedeus cloud -f [flowName] -t [target] osmedeus cloud -m [modulePath] -t [target] osmedeus cloud -c 10 -f [flowName] -T [targetsFile] osmedeus cloud --token xxx -G -c 10 -f [flowName] -T [targetsFile] osmedeus cloud --chunk -c 10 -f [flowName] -t [targetsFile] # Utilities Usage: osmedeus health osmedeus version --json osmedeus utils tmux ls osmedeus utils tmux logs -A -l 10 osmedeus utils ps osmedeus utils ps --proc 'jaeles' osmedeus utils cron --cmd 'osmdeus scan -t example.com' --sch 60 osmedeus utils cron --for --cmd 'osmedeus scan -t example.com'">
# Scan Usage:  osmedeus scan -f [flowName] -t [target]  osmedeus scan -m [modulePath] -T [targetsFile]  osmedeus scan -f /path/to/flow.yaml -t [target]  osmedeus scan -m /path/to/module.yaml -t [target] --params 'port=9200'  osmedeus scan -m /path/to/module.yaml -t [target] -l /tmp/log.log  cat targets | osmedeus scan -f sample# Practical Scan Usage:  osmedeus scan -T list_of_targets.txt -W custom_workspaces  osmedeus scan -t target.com -w workspace_name --debug  osmedeus scan -f general -t www.sample.com  osmedeus scan -f gdirb -T list_of_target.txt  osmedeus scan -m ~/.osmedeus/core/workflow/test/dirbscan.yaml -t list_of_urls.txt  osmedeus scan --wfFolder ~/custom-workflow/ -f your-custom-workflow -t list_of_urls.txt# Provider Usage:  osmedeus provider build  osmedeus provider build --token xxx --rebuild --ic     osmedeus provider create --name 'sample'  osmedeus provider health --debug# Cloud Usage:  osmedeus cloud -f [flowName] -t [target]  osmedeus cloud -m [modulePath] -t [target]  osmedeus cloud -c 10 -f [flowName] -T [targetsFile]  osmedeus cloud --token xxx -G -c 10 -f [flowName] -T [targetsFile]  osmedeus cloud --chunk -c 10 -f [flowName] -t [targetsFile]# Utilities Usage:  osmedeus health  osmedeus version --json  osmedeus utils tmux ls  osmedeus utils tmux logs -A -l 10  osmedeus utils ps  osmedeus utils ps --proc 'jaeles'  osmedeus utils cron --cmd 'osmdeus scan -t example.com' --sch 60  osmedeus utils cron --for --cmd 'osmedeus scan -t example.com'

Community & Discussion

Join Our Discord server here

Donation & Sponsor

Check out for a couple of donation methods here to get a premium package

License

Osmedeus is made with ♥ by @j3ssiejjj and it is released under the MIT license.



Source: www.kitploit.com
Osmedeus - A Workflow Engine For Offensive Security Osmedeus - A Workflow Engine For Offensive Security Reviewed by Anonymous on 12:39 PM Rating: 5